Skip to main site navigation Skip to main content

Thrive On: The Campaign for Utica University →

Utica University Logo
  • Academics
    • Programs
    • Online Programs
      • Online Business Programs
    • Honors Program
    • Graduate Study
    • International Ed & Study Abroad
      • Study Abroad
    • Exceptional Faculty
    • Research & Experiential Learning
      • Experiential Learning Courses
    • Student Support and Success
    • Schedules, Catalogs, and Resources
    • Institutes and Centers
    • Utica University at Florida
      • Tuition and Fees: ABSN Program
      • Accepted Students
    • Current Offerings
    • Program Details
    • Themed Pathways
    • Planning Sheet
  • Tuition and Financial Aid
    • Understanding Financial Aid
      • Value
      • Excelsior, Explained
      • University Scholarships
      • Annual Awards
    • Applying For Financial Aid
    • Tuition and Fees
      • Utica Campus Programs
      • Online Programs
      • ABSN Program
    • Net Price Calculator
    • Pioneer Passport
  • Admissions
    • First-Year Admissions
    • Transfer Admissions
      • Articulation Agreements
    • Graduate Admissions
      • Graduate Inquiry Form
    • International Applicants
      • International Inquiry Form
      • Frequently Asked Questions
    • Visit
      • Utica University Campus
      • Virtual Tour
      • Why Not Fly?
    • Apply Now
    • Contact Us
    • Accepted Student Info
    • High School Counselors
    • High School Bridge Program
  • Community
    • Living on Campus
      • Res Life and Student Living
      • Campus Engagement and Student Activities
    • Satellite Locations
    • The Utica Area
      • Hotels and Restaurants in the Utica Area
    • Utica Stories
    • About Utica
  • Athletics
    • Intercollegiate Athletics
    • Esports
  • News & Events
  • Alumni
  • Giving
  • Apply Now
  • Directory
  • About
  • Library
  • Logins
Utica University
M.S. in Cybersecurity

M.S. in Cybersecurity (Online)

Earn $160,000+ on the Front Lines of Data Security

As data breaches dominate daily headlines, experts who know how to defend sensitive data are in high demand. Utica University’s Master of Science in Cybersecurity online program equips you with the skills and know-how to lead cybersecurity efforts in business, government agencies, or investigative units.

As a leader in economic crime programs for more than 25 years, Utica designed the online master’s in cybersecurity program to combine state-of-the-art practices in intelligence, forensics, and cyber operations.

This 30-credit program offers a carefully created curriculum that will give you the technical ability to protect sensitive systems from the criminals determined to corrupt them. You’ll learn how to combine a focus on cyber defense, cyber offense, and digital forensics and incident response with soft skills like critical thinking, ethics, and decision-making, which are vital to success in the field. The M.S. in Cybersecurity degree also features three career-focused specializations to enhance your skill set.

Plus, you can choose from three specializations in the online cybersecurity degree program to focus your coursework and align your education with your career goals and interests:

  • Digital Forensics
  • Cybersecurity Operations
  • Cybercrime and Fraud

Equipped with this sought-after skill set and real-world knowledge, you’ll graduate prepared to lead in the field of cybersecurity in less than two years.

Virtual Tour    Apply

Cybersecurity M.S. Program Benefits 

  • A top 15 ranked Master’s Degree in Cybersecurity (Fortune Education, 2024)
  • Three specializations to customize your degree
  • Hands-on learning opportunities
  • NSA/DHS designated Center of Academic Excellence in Cyber Defense Education (CAE-CD)

100%

online, part-time

2

years to complete

30

credit hours

$895

cost per credit

Loading...

Defend Against Simulated Attacks in Our Cyber Range

Put your cybersecurity skills to the test with Utica University’s upcoming cyber range. Made possible by a recent $150,000 award from the George I. Alden Trust and $90,000 from the Fred L. Emerson Foundation, this range will give you the opportunity to problem-solve real-world events like ransomware attacks or data breaches in a controlled environment.

With exposure to so many different simulations and experience with real, cutting-edged tools used by professionals, you’ll know from experience what interests you most and what you want to pursue after graduation. 

Read more about our Cyber Range at Utica University

Management

Elevate Your Skills with Real-World Simulations

In 2023, RangeForce was named the Most Comprehensive Cyber Defense Readiness Platform at the Global Infosec Awards.5

Gain crucial cybersecurity experience and become a better cyber defender. Many of Utica University’s cybersecurity courses include RangeForce, an innovative cloud-based training platform, developed by the team that built the cyber range for NATO’s Cooperative Cyber Defense Center, that simulates real-world cybersecurity battles. You’ll work to conquer threats, beat hacking simulations, and perfect your approach through gamified activities. These immersive experiences are separated into Learning Paths. As you successfully complete each Learning Path, you’ll earn impressive digital badges that you can share on your résumé and on social media platforms like LinkedIn.

The skills you gain from Utica University’s RangeForce access are immediately applicable to the current cybersecurity landscape. These are just some of the well-established organizations that are using RangeForce to develop new skillsets for their employees:

  • Barclays
  • Cisco
  • Pipedrive
  • Sodexo
  • Optiv

Ready to learn more about our Cybersecurity M.S. at Utica University?

Request Info Apply Virtual Tour

Prepare for In-Demand Cybersecurity Careers

The top 10% of Information Security Analysts earned more than $186,420 in 2024, with the number of job opportunities expected to grow 33% through 2033.1 CyberSeek’s industry heat map showed over 700,000 cybersecurity job openings were active from October 2021-September 2022. Meanwhile, there’s a 17% gap in the number of workers needed to fill cybersecurity jobs across the U.S.2

With your online master’s in cybersecurity, you’ll be ready to join the top tier of this workforce and earn more while making an impact on data security.

Cybersecurity is always evolving. Working IT security professionals who have theoretical and foundational knowledge from the online master’s in cybersecurity program and practical network and security skills have an advantage in the field over those without both.

Cybersecurity professionals must stay up-to-date on vulnerabilities, exploits, and incoming attacks. Job responsibilities might also include:

  • Serving as the primary point-of-contact for all management and technical areas in response to zero-day attacks.
  • Deploying internetworking technologies such as firewalls, intrusion detection systems, intrusion prevention systems, and virtual private networks (VPNs) to improve the organization’s external security posture.
  • Collaborating with the program and technical leadership team to evaluate staffing requirements for current and emerging projects.
  • Sustaining mission-critical and business-critical requirements, managing ad hoc triage and response teams internally and on coordinated inter-department or inter-agency cyber threat responses.
  • Developing and maintaining complex and risk-adjusted project schedules and complete detailed variance analyses.

Earn a Nationally Recognized Cybersecurity Degree

The National Security Agency and the Department of Homeland Security have designated Utica University as a National Center of Academic Excellence in Cyber Defense Education (CAE/CDE) through the academic year 2024.

Prepare for Industry Certification Exams

Utica is a CompTIA academic partner, our online cybersecurity degree supports students’ preparation for for industry certifications like Cloud+, CYSA+, and PenTest+ certification exams.

Women in Cybersecurity

Only an estimated 20-25% of cybersecurity roles are held by women. With a commitment to decreasing this gender disparity, Utica University is proud to be one of a select number of New York universities to have a Women in Cybersecurity (WiCyS) student chapter. Join a network that promotes the recruitment, retention, and advancement of women in cybersecurity and create lifelong connections. Members of WiCyS have priority access to security training, mentorships, job fairs, and conference scholarships.


Specialize Your Online Cybersecurity Master’s 

Choose the general track or one of three specializations in the cybersecurity bachelor’s program. Each will provide you with the most up-to-date skills and expertise to hit the ground running in the industry segment of your choice. 

Digital Forensics

Pursue your passion for collecting and preparing evidence for computer crimes such as fraud, ransomware and cyber espionage with courses that emphasize a comprehensive understanding of the forensic tools and techniques used to investigate and analyze network-related incidents and preserve digital evidence.

Cybersecurity Operations

Examine defensive and offensive modes of cyber operations as you become a cybersecurity expert. You’ll graduate ready to detect, investigate, and prevent cybercrime for employers ranging from defense contractors to financial services to critical infrastructure.

Cybercrime and Fraud

Master the technical, legal, and ethical aspects of electronic crime, white collar crime and fraud investigation with a focus on risk and compliance, legal issues, fraud management, and advanced fraud analysis techniques.

Learn More About Our Cybersecurity Specializations


“The program perfectly balanced research components and engaging hands-on labs, allowing me to delve deeply into theoretical concepts while applying them in practical, real-world settings. The faculty, comprised of professionals from various sectors of the cybersecurity industry, brought diverse perspectives and profound insights into the classroom. The focus on the latest tools and technologies currently dominating the field ensured that, as students, we gained familiarity and proficiency with the most relevant and advanced resources, equipping us for immediate entry into the workforce. Additionally, the program excelled in providing opportunities for collaboration.”

– Steven Gerhart, Senior Solutions Architect at Cisco Systems

Study With Experts at the Forefront of Cybersecurity

Our faculty have built their expertise on the front lines of cybersecurity. With diverse backgrounds in the industry, many faculty members are still engaged in the field and have expertise in information security, digital forensics, incident response, attack methodology, and more.

As a student of the online cybersecurity degree program, your instructors will provide you with personalized instruction, mentorship, career advice, and a network of opportunities.

Faculty

Our faculty have built their expertise on the front lines of cybersecurity. With diverse backgrounds in the industry, many faculty members are still engaged in the field and have expertise in information security, digital forensics, incident response, attack methodology, and more.

As a student of the online cybersecurity degree program, your instructors will provide you with personalized instruction, mentorship, career advice, and a network of opportunities.

Jacob Benjamin, Ph.D., CISSP

Adjunct Lecturer of Cybersecurity & Information Assurance

Leslie Corbo, D.Sc.

Director of Cybersecurity Programs/Associate Professor, Cybersecurity

Jeff Foley, MS

Adjunct Lecturer of Cybersecurity & Information Assurance

Jack D. Givens, Ph.D.

Associate Professor of Cybersecurity

Maxim Gorbachevsky, M.S.

Professor of Practice- Cybersecurity

John W. Oevering, M.S., M.B.A.

Assistant Director of Cybersecurity & Professor of Practice of Cybersecurity

Andrew Orechovesky, D.Sc., CISSP

Adjunct Lecturer of Cybersecurity & Information Assurance

Michael VanDusen, Ph.D.-IT, CISSP, CISM, CCSP

Adjunct Lecturer of Cybersecurity

Stacey Webb, M.S., MSPA

Adjunct Lecturer of Cybersecurity

Donnie Wendt, D.Sc, CISSP

Adjunct Lecturer of Cybersecurity


Cybersecurity Advisory Council

Utica University’s Cybersecurity Advisory Council was formed in 2024 to further elevate Utica’s cybersecurity programs. Members include the Chief of Staff of the United States Secret Service and leaders from Dragos, Microsoft, Google Cloud, and more.

The mission of the Advisory Council is to:

  1. To develop cutting-edge academic programs in the field of cybersecurity for students and faculty of Utica University;
  2. To assist in the development of best-in-class education and research in these fields at Utica University and affiliated organizations;
  3. To assist Utica University in securing adequate financial resources to support ongoing growth of the cybersecurity program;
  4. To serve as a reliable resource for innovative solutions for industry, government, law enforcement, legal, professional services and defense organizations; and
  5. To foster the development of the next generation of future leaders in cybersecurity.
Jeffrey Amell

Jeffrey Amell

Hilton Worldwide
Director Cybersecurity

Jacob Benjamin

Jacob Benjamin

Dragos Global
Practice Lead

Tony Dessaro

Tony Dessaro

KPMG Director
Cyber Response

Yuri Diogenes

Yuri Diogenes

Microsoft
Principal PM

Kyo Dolan

Kyo Dolan

USSS
Chief of Staff

Ryan Duquette

Ryan Duquette

MNP
Partner
National Lead Digital Forensics

Vincent Esposito

Vincent Esposito

Google Cloud
Head of Americas
Customer Success Managers

Jeff Foley

Jeff Foley

ZeroFox
Vice President of Research

Brenda Gooshaw Samson

Brenda Gooshaw Samson

Flowers Foods & Subsidiaries
Director of Cybersecurity Governance and Culture

Rocco Grillo

Rocco Grillo

Alvarez & Marsal
Managing Director of Global Cyber Risk & IR Investigative Services

Dan Kalil

Dan Kalil

DeepSeas
VP, Global Client Success & Delivery

Spencer Lasker

Spencer Lasker

Citi
Senior VP
Global Lead of Tactical and Vulnerability Cyber Intelligence

Norman Leach

Norman Leach

DAF CLOUDworks
Director

Nathan Little

Nathan Little

Arctic Wolf
VP of Incident Response Strategy

Vito Nozza

Vito Nozza

C1
Director (Chief Architect) – Information Security Advisory Services

Salvatore Paladino

Salvatore Paladino

AIS
Director of Cyber Operations R&D

Griffin Reid

Griffin Reid

KPMG
Lead, Operations & Delivery, Cyber

Brendan Rooney

Brendan Rooney

Booz Allen Hamilton
SVP, Global Commercial Incident Response Lead

Edith Santos

Edith Santos

Apollo Cyber
COO

Melissa Sokolowski

Melissa Sokolowski

Confidential
VP Digital Forensics & Incident Response

Mike Woods

Mike Woods

NCIS
Special Agent in Charge Cyber Field Office

Sources:

1. (ISC)2. (2024). Cybersecurity Workforce Study. Retrieved May 12, 2025, from https://www.isc2.org/Insights/2024/10/ISC2-2024-Cybersecurity-Workforce-Study
2. IBM (2025). Cost of a Data Breach Report 2025. Retrieved May 12, 2025, from https://www.ibm.com/reports/data-breach.
3. Cyberseek.org (2025). Cybersecurity Supply/Demand Heat Map. Retrieved May 12, 2025 from https://www.cyberseek.org/heatmap.html
4. Bureau of Labor Statistics (2022, September 8). Information Security Analysts. Retrieved on February 17, 2023, from https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm
5. Payscale (2023). Security Administrator: Salary. Retrieved February 17, 2023, from https://www.payscale.com/research/US/Job=Security_Administrator%2C_Computer_Network/Salary
6. Payscale (2023). Information Assurance Engineer: Salary. Retrieved February 17, 2023, from https://www.payscale.com/research/US/Job=Information_Assurance_Engineer/Salary
7. CyberSeek (n.d.). Cybersecurity Supply/Demand Heat Map. Retrieved November 9, 2022, from https://www.cyberseek.org/heatmap.html.
8. U.S. News & World Report (n.d.). Online Cybersecurity Degree: An Overview. Retrieved December 3, 2018, from https://www.usnews.com/education/online-education/cyber-security-bachelors-degree
9. Statista (n.d.). Annual number of data compromises and individuals impacted in the United States from 2005 to 2024. Retrieved May 12, 2025, from https://www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/

Request Info

M.S. in Cybersecurity Online Curriculum 

Each course in our Master of Science in Cybersecurity program is carefully designed to prepare you in less than two years for the real-world challenges cybersecurity leaders face every day.

Seven courses comprise the core program, followed by your choice of three specializations that give an extensive understanding of a specific discipline. You’ll complete this program with skills in cybersecurity, leadership, ethics, and decision-making that are vital in any role.

Course abstracts on this page are meant to provide an overview and are subject to change based on term, faculty, and/or institutional requirements. View the official course descriptions as written in the Utica University Academic Catalog and in adherence to regional compliance. Select the appropriate Graduate Catalog from the dropdown.

Explore Courses

Online M.S. in Cybersecurity Admission Requirements 

Applying to our online master’s in cybersecurity program is straightforward, with no GRE or GMAT required. You’ll just need to submit the following: 

  • Completed application
  • All students entering the Master of Science in Cybersecurity program must hold a Bachelor’s degree or equivalent in cybersecurity or a related field with a minimum GPA of 3.0.*
    Applicants with a GPA below the minimum may be admitted at the department’s discretion. A GPA letter will be required.
    *Individuals with an unrelated bachelor’s degree may be accepted on a case-by-case basis with 2-3 years of cybersecurity work experience.
  • Transcript: All students seeking enrollment must have a bachelor’s degree from an accredited institution.
  • Personal Statement: Detail your personal and professional goals and explain how this program will help you bring them to life.
  • Two letters of recommendation from professional references.
  • Work Experience: Work experience in computer science, information technology, or a related field is recommended but not required.
  • Resume: A detailed work history that highlights any experience that may be relevant to this program.

Transfer Credit

Transfer credit is awarded for courses taken at a regionally accredited college that are equivalent to those taught at Utica University and you’ve received a grade of “B” or better. Note that we require official transcripts from all colleges you’ve attended, as well as a transcript showing degree awarded.

Shortly after you receive your letter of admission, you will receive an evaluation of your transfer credits from the Registrar’s Office. If you want to review possible credit eligibility ahead of time, use TES®.

International Students

International Credential Evaluation of transcripts showing equivalency to a U.S. bachelor’s degree with minimum GPA of 3.0 is required for this program.

If English is not your first language, submit your test scores from either the TOEFL or IELTS.

Utica requires a TOEFL score of 550 written, 213 computer-based, or 79 internet-based. Utica requires a IELTS score of 6.0.

Get Started
Tuition and Financial Aid

This 30-credit program costs $895 per credit hour. Utica University is dedicated to making an advanced education accessible and affordable. Learn more about financial aid, including grants, student loans, and other options, on the Financial Aid tab of our Graduate Admissions page.

Learn more

Specializations

Choose the general track or one of four specializations in the cybersecurity master’s program. Each will provide you with the most up-to-date skills and expertise to hit the ground running in the industry segment of your choice.

Bring Cybercriminals to Justice

Pursue your passion for collecting evidence and investigating computer crimes such as fraud, ransomware and data theft with courses that emphasize a comprehensive understanding of the forensic tools and techniques used to investigate and analyze network-related incidents and preserve digital evidence. Computer crime encompasses a wide range of illegal activities that cost corporations revenue and pose a threat to our national security and individuals alike. In this 100% online master’s program, you’ll gain the skills you need for cyber forensics certifications and make an impact in this rapidly growing field.

Use your cybersecurity skills to fight fraud and other cybercrime. You’ll graduate with Utica University’s Master of Science in Cybersecurity, Digital Forensics specialization knowing how to address ever-changing attack and infiltration techniques and with hands-on experience in cyber intelligence, critical infrastructures, and investigative principles.

Cyber Forensics Certifications

The foundation of knowledge gained through this specialization will support your preparation for testing for the following industry-recognized cyber forensics certifications:

  • Certified Forensic Computer Examiner
  • Certified Computer Examiner
  • GIAC Certified Forensic Examiner or Analyst
  • Computer Hacking Forensic Investigator

Excel as an Expert in Digital Forensics

Graduates of the Digital Forensics specialization can go on to careers in a range of investigative areas, including:

  • Security operations centers
  • Incident response
  • Organized crime
  • Financial fraud investigation

The Digital Forensics specialization is designed to provide you with a comprehensive skill set that is particularly valuable to businesses, banks, and other corporate institutions. You’ll learn to leverage investigative best practices and how to protect organizations from cybercriminals.

CAREER SPOTLIGHT: CLOUD SECURITY ANALYST

$108,266/year

As a cloud security analyst, you’ll ensure that security is implemented as part of the design and development measures of a client’s cloud solution. You’ll also review existing cloud security measures and processes and provide updated recommendations based on ever-changing best practices.1

CAREER SPOTLIGHT: DIGITAL FORENSICS AND INCIDENT RESPONSE ANALYST

$72,849/year

When an attack is successful, an incident response analyst works with the cybersecurity defense team to keep it from escalating, minimize the effect, and ensure all traces of the breach have been eradicated through a system analysis after the resolution is thought to be complete.2

Other titles you may qualify for:

  • Cybersecurity Analyst
  • Forensic Investigator

Learn to Detect and Investigate Cyber Threats

With a unique focus on coursework in networks, defensive and offensive tactics, vulnerability assessments, penetration testing, and programming, this specialization provides you with skills to dominate in the area of Cyber Operations while keeping your organization safe. Explore incident response to system compromise, risk management decision-making, and legal and regulatory analyses. Learn about building and configuring secure environments, providing trusted solutions, and more.

Course Spotlight: CYB 652 – Intrusion Forensics and Network Analysis

Data breaches are a grave concern for today’s organizations. There is a need for experts to identify when an unlawful intrusion has occurred and what data may have been exposed or exfiltrated. This course focuses on using network-based information sources to help answer those questions.

Course Catalog

Apply Now


Sources

1. https://www.glassdoor.com/Salaries/cloud-security-analyst-salary-SRCH_KO0,22.htm
2. https://www.salary.com/research/salary/recruiting/incident-response-analyst-salary/chicago-il

Cybersecurity is more than just defending against cyberattacks. Through 21 core credits and 9 specialization credits, you’ll examine both defensive and offensive modes of cyber operations in Utica University’s Master of Science in Cybersecurity, Cybersecurity Operations specialization.

By understanding both sides of the spectrum through hands-on coursework, you’ll graduate ready to detect, investigate, and prevent cybercrime for employers ranging from defense contractors to financial services to critical infrastructure.

Career Outlook

7.9 Billion. In aggregate, Spirion reports that was the economic toll in 2021 for organizations that experienced data breaches, with an average cost of 4.24 million per breach. They note that cyberattacks are a near-constant threat to modern business. Attacks occur every 10 seconds, and in January of 2021 alone, there were more data records compromised than the total number of records stolen in 2017. IBM reports that in 2021, an average of 4.24 million per breach was reached — the highest average in their 17-year history in reporting on the topic. Organizations that implemented the skills and technologies like those taught in the Cybersecurity Operations Specialization at Utica, like artificial intelligence (AI) and a zero trust approach, reduced their costs by millions. And those with a current cloud migration strategy contained the breach, on average, 77 days faster than those in earlier stages of modernization.

CAREER SPOTLIGHT: COMPUTER NETWORK DEFENSE ANALYST
$73,231/year

As a computer network defense analyst, you could be responsible for assessing security controls and applying appropriate incident response methods to ensure critical networks are properly protected from cyberattack. You would also investigate threats, manage network access, and more.1

CAREER SPOTLIGHT: SOC ANALYST
$95,078/year

A Security Operations Center (SOC) Analyst finds security breaches and likely cyberattacks by reviewing incident notifications and running vulnerability assessments. They’ll report attacks to superiors, and create improvement strategies for better security. They’ll also complete risk analysis and security operations to find holes in their systems before attackers can.2

Other titles you may qualify for:

  • Penetration Tester
  • Computer Network Operations Analyst
  • Vulnerability Assessment Analyst

Curriculum: Gain Practical Experience in the Virtual Classroom

As one of the few programs in the U.S. that address cyber operations technology, this specialization uses virtual hands-on labs to help students gain critical skills in current technologies. Utica’s online infrastructure provides special servers, virtual machines, and experimental environments that give students a “learn by doing” experience. Labs include penetration testing, vulnerability assessment, data hiding and steganography, anonymity, and autonomous cyber operations.

Course Spotlight: CYB 691 – Malware Practicum

This practicum course is a graduate level course in the specialized area of malware analysis that is designed to give students supervised practical application of previously or concurrent studied theory in malware mitigation and analysis. This course uses knowledge and methods presented in earlier courses as theory or examples in real-live practical examples. Students will learn the nuances of finding and mitigating malware which will be particularly well suited to mitigating targeted attacks. The student will use specialized malware analysis tools and environments along with a deep understanding of the technical methods of malicious codes (malcode). We will also highlight specific methods to gain speed in an analysis and how enterprise-wide mitigation methods may be employed.

Sources

1. https://www.salary.com/research/salary/position/network-defense-analyst-salary
2. https://www.salary.com/research/salary/listing/soc-analyst-salary

Cybersecurity and financial crime investigation are more interconnected than ever, with modern criminals using cyber tools and advanced malware to commit advanced, high-technology crimes.

Crimes of this nature result in the loss of substantial amounts of money and have a serious effect on business, government, individuals, and the national economy. Today’s information-intensive organizations are in desperate need of employees who understand both cybersecurity and financial crime investigation.

Apply your cybersecurity background to the realm of fraud with Utica University’s Master of Science in Cybersecurity, Cybercrime and Fraud specialization. You’ll learn to leverage fraud risk and compliance best practices and how to utilize fraud management technologies to protect businesses from cybercriminals.

Career Outlook

The Cybercrime and Fraud specialization is designed to provide you with a comprehensive skill set that is particularly valuable for professionals in banking and other financial institutions. With that said, graduates of this program are also equipped to enter industries ranging from healthcare to insurance and beyond.

CAREER SPOTLIGHT: RISK ANALYST
$69,116/year

As a risk analyst, specifically in the banking and financial industry, you would be responsible for compiling and analyzing data in order to calculate risks associated with the approval of client and/or vendor relationships. These professionals create reports, establish quality control measures, and more.1

CAREER SPOTLIGHT: ANTI MONEY LAUNDERING (AML) COMPLIANCE OFFICER
$70,014/year

As a compliance officer, specifically with AML skills, you would be responsible for assessing and ensuring state and federal compliance by conducting periodic internal financial audits and establishing risk management strategies.2

Other titles you may qualify for:

  • Fraud Examiner or Fraud Analyst
  • Cybercrime Investigator
  • Cyber Fraud Investigator
  • Law Enforcement

Curriculum: Innovative Methods to Combat Cybercrime

Through our innovative curriculum, you’ll examine current issues and trends in financial crime and compliance management, white-collar crime investigation, and fraud prevention and detection. Courses you’ll take include:

Course Spotlight: FCM 631 – Fraud Management and Technology

You’ll examine the challenges of management in an increasingly technological environment. You’ll also explore the history and evolutionary development of counter-fraud technology and the integration of fraud management in the development of new corporate products or instruments. You’ll learn to anticipate new forms of fraud based on the application of new and anticipated technologies.

Sources

1. PayScale (n.d.). “Average Risk Analyst Salary.” Retrieved February 22, 2023 from https://www.payscale.com/research/US/Job=Risk_Analyst/Salary
2. PayScale (n.d.). Average Compliance Officer with Anti-Money Laundering (AML) Skills Salary. (n.d.). Retrieved February 22, 2023 from https://www.payscale.com/research/US/Job=Compliance_Officer/Salary/86503f63/Anti-Money-Laundering-AML

Ready to Learn More About our B.S. in Cybersecurity?

Request Info Apply Virtual Tour

Protect the world’s data from cybercriminals and thrive.

With your Master of Science in Cybersecurity from Utica University, you’ll have the technical skills and specialized expertise to join the front lines in the battle against cybercrime. Plus, the curriculum will help you prepare to test for professional certifications like Cloud+, CYSA+, and PenTest+.

The average cybersecurity salary was $108,967 in 2025. With projected job growth of 33% by 2033, and a 17% gap in workers needed to fill current openings, there is no shortage of career potential for master’s in cybersecurity jobs.2  Because data breaches are increasing and a shortage of qualified experts persists, your new skills will put you in high demand.

As you build your skills through our industry-responsive curriculum, you’ll choose a specialization in Cybercrime and Fraud, Digital Forensics, or Cybersecurity Operations.

Key Skills Employers Need

  • A deep understanding of cybersecurity and cyber-attack tools, tactics, techniques, procedures, and technologies, and the design of effective defenses
  • Evaluation of cybersecurity and risk management issues as they relate to securing and defending both information technology and critical national infrastructures
  • Collection and analysis of data in support of threat hunting and incident response efforts
  • Ethical decision-making skills in cybersecurity management
  • Cyber defense and attack methods

Explore master’s in cybersecurity salary and job opportunities below.

► TOP 10%
Computer and Information Security Analysts (ISA) earn more than $165,920 annually1


► 33% GROWTH
Cybersecurity ISA job outlook projected, 2023–20331


► 4.7 MILLION
Unfilled cybersecurity jobs in 20243

Request Info

Examples of Career Opportunities with an M.S. in Cybersecurity

Your earning potential and job outlook are high when you obtain a master’s in cybersecurity. Qualify for roles like:

Research Analysis
Information Security Analyst

$124,910/year

Information security analysts are responsible for providing security solutions for their companies. Their primary duties include researching, collecting data, developing secure strategies, and maximizing productivity. They also are in charge of implementing security principles while following strict privacy policies.1

Cybersecurity Analysis
Security Architect

$121,934/year

With a high-level understanding of the principles and technical tactics of cyberattacks and defense, security architects are responsible for their company’s network and computer security. At the early stages of the security life cycle, the security architect acts as a project leader to plan, research, and design elements of security.4

Market Research Analysis
Chief Security Officer

$233,000+/year

Take on the demanding task of ensuring all security teams, protocols, and systems contribute to a successful and productive business or organization, guaranteeing the protection of the company’s assets, information, and employees. They are also responsible for coordinating crisis/security management programs and efforts throughout the company and informing all employees of company security policy changes.5

Additional roles for graduates of the M.S. in Cybersecurity program: 

  • IT Risk Manager
  • Cyber Operations Analyst
  • Principal Consultant Cybersecurity
  • Supplier Security Compliance Manager

Sources:

1. https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm
2. https://www.cyberseek.org/heatmap.html
3. https://www.isc2.org/Insights/2024/10/ISC2-2024-Cybersecurity-Workforce-Study
4. https://www.payscale.com/research/US/Job=Security_Architect/Salary
5. https://cybersn.com/role/chief-security-officer-cso/

 


Contact Our Admissions Team

Office of Admissions

Cynkus Family Welcome Center

Office of Admissions

Cynkus Family Welcome Center
(315) 792-3333
connect@info.utica.edu

Admissions & Visit

  • Virtual Tour
  • Visit Campus
  • Request Information
  • Apply to Utica

I would like to see logins and resources for:

For a general list of frequently used logins, you can also visit our logins page.

Utica University Logo
FacebookTwitterInstagramYouTube
  • Academics
  • Tuition and Financial Aid
  • Admissions
  • Community
  • Athletics
1600 Burrstone Road, Utica, NY 13502
Map & Directions
(315) 792-3006
Contact Us
  • Institutional Effectiveness
  • Bookstore
  • Disability Learning Support
  • Student Right to Know
2024-2025 College of Distinction2024-2025 Private College of Distinction2024-2025 Business College of Distinction2024-2025 Education College of Distinction2024-2025 Nursing College of Distinction2024-2025 Career Development College of Distinction2024-2025 Equity & Inclusion College of Distinction2023-2024 Military Friendly (Silver)